SlideShare a Scribd company logo
Blockchain technologies
drive better security solutions
Journée Blockchain SIF
November 2016
Nicolas Bacca
@btchip
A trust layer between the blockchain
and the physical world
For industrials, enterprises and consumers
Securing the first and last mile
LEDGER TECHNOLOGY
Without trust, data has no actionable value
node
node
node
node
nodeCloud servers
User on a PC or a
smartphone Industrial
sensor / IoT
node
node node
Connected
object
Blockchain/IT
trusted zone
Physical world
absence of trust
Is this really you?
Am I allowed to executethis transaction?
Critical temperature data
Did the driver got switched?
Why ? Cryptocurrencies come with built-in bug bounties
#SFYL
CO 2.0
The DAO timeline
The
DAO
The
DAO
Black
DAO
The
DAO
Black
DAO
White
DAO
The
DAO
Black
DAO
White
DAO
DAO
refund
ETH
ETC
ETH
Creation of a
new currency
Hacker exit
Security improvements
Aligned with the latest identity standards
Reducing dependencies on non deterministic events (randomness …)
Solving the user keyring problem
Innovating with internet-ready security devices
The password is dead
How can it be replaced ?
Hardware based cryptographic authentication for the webs
FIDO set of standards
Minimalist cryptography (one size fits all)
Multilple vendors
Slow but large traction (Google, Github)
The building block of modern security devices
The problems with randomness
Hard (impossible) to fully get rid of randomness
Generating unbiased randomness is a hard problem
Proving that randomness is unbiased is an even harder problem
Modern cryptographic algorithms are brittle, making it an easy attack vector
Attacks of the Five Eyes
No evil, omnipotent wizards
Have a lot of time
Have a lot of resources (crunching weak randoms is easy, see Logjam)
Can interfere with standards (see DUAL_EC_DRBG)
Attacks on randomness provides good plausible deniability
Blockchain technologies solutions to randomness
Recognize the problem : make it easier to evaluate
Only depend on it when it’s absolutely necessary (key generation)
Promote deterministic signatures (ECDSA / RFC 6979)
Avoid catastrophic algorithm failure on signature (see PS3 27C3)
The silent killer : side channel attacks
An unfortunate side effect of non deterministic code
Predict code parameters (such as private keys) given external events
Extremely powerful and not taken care of enough (see “CSI meets public wifi”)
Important work being done by the community on Bitcoin curve with libsecp256k1
The user keyring problem
Too many keys, too many protocols
Hard to backup (additional weakness / hard to remember)
Too many devices
Solving the user keyring
Deriving keys from a master key (BIP 32, Hierarchical Deterministic Wallets)
Using a nice property of Elliptic Curve keys
Public(PrivateK + (%n)Scalar) = PublicK + (point)Scalar * Generator
Can be extended/abused to RSA (find next prime …)
Providing an easy way to remember the master key (BIP 39, Mnemonic Phrase)
Turning entropy into words, not the other way round (see Brainflyer)
Why the Smartcard has to be reinvented
Not web-ready : designed to work in a trusted environment
Not user friendly (reader, drivers, middlewares)
Not developer friendly (Java Card if lucky)
Not customer audit friendly
Challenges of improving the Smartcard
Tamper
resistant
Developer friendly Auditable
What has been accomplished so far
Multiple devices with different tamper resistance properties
Web integration, reusing FIDO work on U2F (Ledger with MyEtherWallet)
Web ready : malware resistant
<Ad> New paradigms for native multi application platforms </Ad>
The exhaustive list of Blockchain security standards
<- (is not a security standard)
Blockchain security ...
Moves at startup speed (ETH from EAL0 to EAL7 in 6 months, according to ETH)
Is battlefield tested (or assets are lost very quickly)
Bitcoin is a pretty good canary (see “Some SecureRandom thoughts” on Android)
Is interesting to look at for the general security / identity industry
On the other hand can also learn a lot from those industries wrt testing / evaluation
Thank you
@btchip
https://www.chaintech.fr/

More Related Content

What's hot

IoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - EurotechIoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - Eurotech
Luca Dazi
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure Sphere
Azure SphereAzure Sphere
Azure Sphere
Mirco Vanini
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
Iot Security
Iot SecurityIot Security
Iot Security
MAITREYA MISRA
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
MskDotNet Community
 
Scaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of ThingsScaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of Things
Balena
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
EC-Council
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
Tutun Juhana
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Charalampos Doukas
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
centralohioissa
 
IoT on Azure
IoT on AzureIoT on Azure
IoT on Azure
Vinoth Rajagopalan
 
DotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il ConcentratoreDotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il Concentratore
Riccardo Cappello
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
Pradeep Jeswani
 
Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018
FrenchTechCentral
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World
 
Using FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutionsUsing FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutions
DunavNET
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 

What's hot (20)

IoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - EurotechIoT Saturday PN 2019 - Eurotech
IoT Saturday PN 2019 - Eurotech
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
 
Azure Sphere
Azure SphereAzure Sphere
Azure Sphere
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
 
Scaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of ThingsScaling IoT Deployments: DevOps for the Internet of Things
Scaling IoT Deployments: DevOps for the Internet of Things
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
 
IoT on Azure
IoT on AzureIoT on Azure
IoT on Azure
 
DotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il ConcentratoreDotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il Concentratore
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
 
Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Using FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutionsUsing FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutions
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 

Viewers also liked

Malaysia
MalaysiaMalaysia
Malaysia
h00224718
 
Alex Twigg GM UBank Interviewed for Who's Who 2012/13
Alex Twigg GM UBank Interviewed for Who's Who 2012/13Alex Twigg GM UBank Interviewed for Who's Who 2012/13
Alex Twigg GM UBank Interviewed for Who's Who 2012/13
Alex Twigg
 
Ti nicole karolina_gema_powerpoint
Ti nicole karolina_gema_powerpointTi nicole karolina_gema_powerpoint
Ti nicole karolina_gema_powerpointCarolina Rodriguez
 
Presentación1
Presentación1Presentación1
Presentación1
esteban9226
 
Línea de tiempo jose luis
Línea de tiempo jose luisLínea de tiempo jose luis
Línea de tiempo jose luis
Jhöan Fernändo Lozäno
 
Johnson Controls Certificate performance
Johnson Controls Certificate  performanceJohnson Controls Certificate  performance
Johnson Controls Certificate performancePEDRO CRUZ
 
Andre vert JFK2011
Andre vert JFK2011Andre vert JFK2011
Andre vert JFK2011
Pierre Trudelle
 
Think Like a Project Manager
Think Like a Project ManagerThink Like a Project Manager
Think Like a Project Manager
Emily Clasper
 
Presupuesto sala de informatica
Presupuesto sala de informaticaPresupuesto sala de informatica
Presupuesto sala de informatica
Leyre Trobajo Redondo
 
СХД для обработки сейсмики: сравнительный обзор
СХД для обработки сейсмики: сравнительный обзорСХД для обработки сейсмики: сравнительный обзор
СХД для обработки сейсмики: сравнительный обзор
Vsevolod Shabad
 
Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...
Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...
Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...
Rednef68 Rednef68
 
Concepto Estratégico Militar para la Defensa Integral de la Nación.
Concepto Estratégico Militar para la Defensa Integral de la Nación.Concepto Estratégico Militar para la Defensa Integral de la Nación.
Concepto Estratégico Militar para la Defensa Integral de la Nación.
armando1957
 
Media pitch final
Media pitch  finalMedia pitch  final
Media pitch final
elrichards18
 
Evaluation 6
Evaluation 6Evaluation 6
Evaluation 6
elrichards18
 
Zukunft von Bibliotheken 2016
Zukunft von Bibliotheken 2016Zukunft von Bibliotheken 2016
Zukunft von Bibliotheken 2016
Rudolf Mumenthaler
 

Viewers also liked (15)

Malaysia
MalaysiaMalaysia
Malaysia
 
Alex Twigg GM UBank Interviewed for Who's Who 2012/13
Alex Twigg GM UBank Interviewed for Who's Who 2012/13Alex Twigg GM UBank Interviewed for Who's Who 2012/13
Alex Twigg GM UBank Interviewed for Who's Who 2012/13
 
Ti nicole karolina_gema_powerpoint
Ti nicole karolina_gema_powerpointTi nicole karolina_gema_powerpoint
Ti nicole karolina_gema_powerpoint
 
Presentación1
Presentación1Presentación1
Presentación1
 
Línea de tiempo jose luis
Línea de tiempo jose luisLínea de tiempo jose luis
Línea de tiempo jose luis
 
Johnson Controls Certificate performance
Johnson Controls Certificate  performanceJohnson Controls Certificate  performance
Johnson Controls Certificate performance
 
Andre vert JFK2011
Andre vert JFK2011Andre vert JFK2011
Andre vert JFK2011
 
Think Like a Project Manager
Think Like a Project ManagerThink Like a Project Manager
Think Like a Project Manager
 
Presupuesto sala de informatica
Presupuesto sala de informaticaPresupuesto sala de informatica
Presupuesto sala de informatica
 
СХД для обработки сейсмики: сравнительный обзор
СХД для обработки сейсмики: сравнительный обзорСХД для обработки сейсмики: сравнительный обзор
СХД для обработки сейсмики: сравнительный обзор
 
Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...
Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...
Cours Techniques d'Expression & de Communication I - Initiation- ENSASafi Mor...
 
Concepto Estratégico Militar para la Defensa Integral de la Nación.
Concepto Estratégico Militar para la Defensa Integral de la Nación.Concepto Estratégico Militar para la Defensa Integral de la Nación.
Concepto Estratégico Militar para la Defensa Integral de la Nación.
 
Media pitch final
Media pitch  finalMedia pitch  final
Media pitch final
 
Evaluation 6
Evaluation 6Evaluation 6
Evaluation 6
 
Zukunft von Bibliotheken 2016
Zukunft von Bibliotheken 2016Zukunft von Bibliotheken 2016
Zukunft von Bibliotheken 2016
 

Similar to Blockchain solutions leading to better security practices

Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers"
shawn_merdinger
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
ハイシンク創研 / Laboratory of Hi-Think Corporation
 
New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by Blockchain
Slash
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
MecklerMedia
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
Guido Schmutz
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
CrowdSec
 
Future of hardware wallets bip 001
Future of hardware wallets   bip 001Future of hardware wallets   bip 001
Future of hardware wallets bip 001Eric Larcheveque
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
 
Windows Core IoT for Makers - MVPDays
Windows Core IoT for Makers - MVPDaysWindows Core IoT for Makers - MVPDays
Windows Core IoT for Makers - MVPDays
Guy Barrette
 
Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
msyukor
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
ShapeBlue
 
The Promise of BlockChain
The Promise of BlockChainThe Promise of BlockChain
The Promise of BlockChain
Nevada County Tech Connection
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
Biagio Botticelli
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
Priyanka Aash
 
Blockchain & microsoft
Blockchain & microsoftBlockchain & microsoft
Blockchain & microsoft
İbrahim KIVANÇ
 
BGX Pitch Deck
BGX Pitch DeckBGX Pitch Deck
BGX Pitch Deck
Alexander Khvatov
 
Re-engineering Engineering: from a cathedral to a bazaar?
Re-engineering Engineering: from a cathedral to a bazaar?Re-engineering Engineering: from a cathedral to a bazaar?
Re-engineering Engineering: from a cathedral to a bazaar?
Open Networking Summits
 
Implementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and CryptocurrenciesImplementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Payson Johnston
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
IRJET Journal
 
Blockchin architecture azure meetup
Blockchin architecture azure meetupBlockchin architecture azure meetup
Blockchin architecture azure meetup
Mohammad Asif
 

Similar to Blockchain solutions leading to better security practices (20)

Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers"
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
 
New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by Blockchain
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Future of hardware wallets bip 001
Future of hardware wallets   bip 001Future of hardware wallets   bip 001
Future of hardware wallets bip 001
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
 
Windows Core IoT for Makers - MVPDays
Windows Core IoT for Makers - MVPDaysWindows Core IoT for Makers - MVPDays
Windows Core IoT for Makers - MVPDays
 
Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
The Promise of BlockChain
The Promise of BlockChainThe Promise of BlockChain
The Promise of BlockChain
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
Blockchain & microsoft
Blockchain & microsoftBlockchain & microsoft
Blockchain & microsoft
 
BGX Pitch Deck
BGX Pitch DeckBGX Pitch Deck
BGX Pitch Deck
 
Re-engineering Engineering: from a cathedral to a bazaar?
Re-engineering Engineering: from a cathedral to a bazaar?Re-engineering Engineering: from a cathedral to a bazaar?
Re-engineering Engineering: from a cathedral to a bazaar?
 
Implementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and CryptocurrenciesImplementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and Cryptocurrencies
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
Blockchin architecture azure meetup
Blockchin architecture azure meetupBlockchin architecture azure meetup
Blockchin architecture azure meetup
 

Recently uploaded

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 

Recently uploaded (20)

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 

Blockchain solutions leading to better security practices

  • 1. Blockchain technologies drive better security solutions Journée Blockchain SIF November 2016 Nicolas Bacca @btchip
  • 2. A trust layer between the blockchain and the physical world For industrials, enterprises and consumers Securing the first and last mile LEDGER TECHNOLOGY
  • 3. Without trust, data has no actionable value node node node node nodeCloud servers User on a PC or a smartphone Industrial sensor / IoT node node node Connected object Blockchain/IT trusted zone Physical world absence of trust Is this really you? Am I allowed to executethis transaction? Critical temperature data Did the driver got switched?
  • 4. Why ? Cryptocurrencies come with built-in bug bounties #SFYL CO 2.0
  • 6. Security improvements Aligned with the latest identity standards Reducing dependencies on non deterministic events (randomness …) Solving the user keyring problem Innovating with internet-ready security devices
  • 8. How can it be replaced ? Hardware based cryptographic authentication for the webs FIDO set of standards Minimalist cryptography (one size fits all) Multilple vendors Slow but large traction (Google, Github) The building block of modern security devices
  • 9. The problems with randomness Hard (impossible) to fully get rid of randomness Generating unbiased randomness is a hard problem Proving that randomness is unbiased is an even harder problem Modern cryptographic algorithms are brittle, making it an easy attack vector
  • 10. Attacks of the Five Eyes No evil, omnipotent wizards Have a lot of time Have a lot of resources (crunching weak randoms is easy, see Logjam) Can interfere with standards (see DUAL_EC_DRBG) Attacks on randomness provides good plausible deniability
  • 11. Blockchain technologies solutions to randomness Recognize the problem : make it easier to evaluate Only depend on it when it’s absolutely necessary (key generation) Promote deterministic signatures (ECDSA / RFC 6979) Avoid catastrophic algorithm failure on signature (see PS3 27C3)
  • 12. The silent killer : side channel attacks An unfortunate side effect of non deterministic code Predict code parameters (such as private keys) given external events Extremely powerful and not taken care of enough (see “CSI meets public wifi”) Important work being done by the community on Bitcoin curve with libsecp256k1
  • 13. The user keyring problem Too many keys, too many protocols Hard to backup (additional weakness / hard to remember) Too many devices
  • 14. Solving the user keyring Deriving keys from a master key (BIP 32, Hierarchical Deterministic Wallets) Using a nice property of Elliptic Curve keys Public(PrivateK + (%n)Scalar) = PublicK + (point)Scalar * Generator Can be extended/abused to RSA (find next prime …) Providing an easy way to remember the master key (BIP 39, Mnemonic Phrase) Turning entropy into words, not the other way round (see Brainflyer)
  • 15. Why the Smartcard has to be reinvented Not web-ready : designed to work in a trusted environment Not user friendly (reader, drivers, middlewares) Not developer friendly (Java Card if lucky) Not customer audit friendly
  • 16. Challenges of improving the Smartcard Tamper resistant Developer friendly Auditable
  • 17. What has been accomplished so far Multiple devices with different tamper resistance properties Web integration, reusing FIDO work on U2F (Ledger with MyEtherWallet) Web ready : malware resistant <Ad> New paradigms for native multi application platforms </Ad>
  • 18. The exhaustive list of Blockchain security standards <- (is not a security standard)
  • 19. Blockchain security ... Moves at startup speed (ETH from EAL0 to EAL7 in 6 months, according to ETH) Is battlefield tested (or assets are lost very quickly) Bitcoin is a pretty good canary (see “Some SecureRandom thoughts” on Android) Is interesting to look at for the general security / identity industry On the other hand can also learn a lot from those industries wrt testing / evaluation